Close Menu
TechCentralTechCentral

    Subscribe to the newsletter

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    Facebook X (Twitter) YouTube LinkedIn
    WhatsApp Facebook X (Twitter) LinkedIn YouTube
    TechCentralTechCentral
    • News

      How a dowdy database maker became an investor darling

      18 June 2025

      Who let the dogs order? Sixty60 now delivers for Fido

      18 June 2025

      Starlink to South Africa: ‘We are ready to invest’

      17 June 2025

      Vodacom CEO Joosub bags R71m in pay – but taxman will take a big cut

      17 June 2025

      Major rift opens between Microsoft and OpenAI

      17 June 2025
    • World

      Trump Mobile dials into politics, profit and patriarchy

      17 June 2025

      Samsung plots health data hub to link users and doctors in real time

      17 June 2025

      TechCentral Nexus S0E2: South Africa’s digital battlefield

      16 June 2025

      Yahoo tries to make its mail service relevant again

      13 June 2025

      Qualcomm shows off new chip for AI smart glasses

      11 June 2025
    • In-depth

      Grok promised bias-free chat. Then came the edits

      2 June 2025

      Digital fortress: We go inside JB5, Teraco’s giant new AI-ready data centre

      30 May 2025

      Sam Altman and Jony Ive’s big bet to out-Apple Apple

      22 May 2025

      South Africa unveils big state digital reform programme

      12 May 2025

      Is this the end of Google Search as we know it?

      12 May 2025
    • TCS

      TechCentral Nexus S0E1: Starlink, BEE and a new leader at Vodacom

      8 June 2025

      TCS+ | The future of mobile money, with MTN’s Kagiso Mothibi

      6 June 2025

      TCS+ | AI is more than hype: Workday execs unpack real human impact

      4 June 2025

      TCS | Sentiv, and the story behind the buyout of Altron Nexus

      3 June 2025

      TCS | Signal restored: Unpacking the Blue Label and Cell C turnaround

      28 May 2025
    • Opinion

      Beyond the box: why IT distribution depends on real partnerships

      2 June 2025

      South Africa’s next crisis? Being offline in an AI-driven world

      2 June 2025

      Digital giants boost South African news media – and get blamed for it

      29 May 2025

      Solar panic? The truth about SSEG, fines and municipal rules

      14 April 2025

      Data protection must be crypto industry’s top priority

      9 April 2025
    • Company Hubs
      • Africa Data Centres
      • AfriGIS
      • Altron Digital Business
      • Altron Document Solutions
      • Altron Group
      • Arctic Wolf
      • AvertITD
      • Braintree
      • CallMiner
      • CYBER1 Solutions
      • Digicloud Africa
      • Digimune
      • Domains.co.za
      • ESET
      • Euphoria Telecom
      • Incredible Business
      • iONLINE
      • Iris Network Systems
      • LSD Open
      • NEC XON
      • Network Platforms
      • Next DLP
      • Ovations
      • Paracon
      • Paratus
      • Q-KON
      • SevenC
      • SkyWire
      • Solid8 Technologies
      • Telit Cinterion
      • Tenable
      • Vertiv
      • Videri Digital
      • Wipro
      • Workday
    • Sections
      • AI and machine learning
      • Banking
      • Broadcasting and Media
      • Cloud services
      • Contact centres and CX
      • Cryptocurrencies
      • Education and skills
      • Electronics and hardware
      • Energy and sustainability
      • Enterprise software
      • Fintech
      • Information security
      • Internet and connectivity
      • Internet of Things
      • Investment
      • IT services
      • Lifestyle
      • Motoring
      • Public sector
      • Retail and e-commerce
      • Science
      • SMEs and start-ups
      • Social media
      • Talent and leadership
      • Telecoms
    • Events
    • Advertise
    TechCentralTechCentral
    Home » In-depth » How secure is your phone’s lock screen?

    How secure is your phone’s lock screen?

    By The Conversation6 April 2016
    Twitter LinkedIn Facebook WhatsApp Email Telegram Copy Link
    News Alerts
    WhatsApp

    iphone-user-640

    One consequence of the Apple vs FBI drama has been to shine a spotlight on the security of smartphone lock screens.

    The fact that the FBI managed to hack the iPhone of the San Bernardino shooter without Apple’s help raises questions about whether Pin codes and swipe patterns are as secure as we think.

    In fact, they’re probably not as secure as we’d hope. No device as complex as a smartphone or tablet is ever completely secure, but device manufactures and developers are still doing their best to keep your data safe.

    The first line of defence is your lock screen, typically protected by a Pin code or password.

    When it comes to smartphones, the humble four-digit Pin code is the most popular choice. Unfortunately, even ignoring terrible Pin combinations such as “1234”, “1111” or “7777”, four-digit Pin codes are still incredibly weak, since there are only 10 000 unique possible Pins.

    If you lose your device, and there are no other protections, it would only take a couple of days for someone to find the correct Pin through brute force.

    A random, six-digit Pin will afford you better security, given that there are a million possible combinations. However, with a weak Pin and a bit of time and luck, it’s still possible for someone to bypass this using something like Rubber Ducky, a tool designed to try every Pin combination without triggering other security mechanisms.

    Checks and balances

    Fortunately, there other safeguards in place. On iPhones and iPads, for instance, there is a forced delay of 80ms between Pin or password attempts.

    And after 10 incorrect attempts, the device will either time-out for increasing periods of time, lock out completely, or potentially delete all data permanently, depending on your settings.

    Similarly, Android devices enforce time delays after a number of passcode or password entries. However, stock Android devices will not delete their contents after any number of incorrect entries.

    Swipe patterns are also a good security mechanism, as there are more possible combinations than a four-digit Pin. Additionally, you can’t set your swipe pattern to be the same as your banking PIN or password, so if one is compromised, then the others remain secure.

    However, all of these security controls can potentially be thwarted. By simply observing the fingerprints on a device’s display on an unclean screen, it is possible to discern a swipe pattern or passcode. When it comes to touch screen devices, cleanliness is next to secure-ness.

    Bypasses

    Speaking of fingers, biometrics have increased in popularity recently. Biometric security controls simply means that traits of a human body can be used to identify someone and therefore unlock something.

    In the case of smartphones, there are competing systems that offer various levels of security. Android has facial, voice and fingerprint unlocking, while iOS has fingerprint unlocking only.

    Generally, biometrics on their own are not inherently secure. When used as the only protection mechanism, they’re often very unreliable, either allowing too many unauthorised users to access a device (false positives), or by creating a frustrating user experience by locking out legitimate users (false negatives).

    Some methods of bypassing these biometric protections have been widely publicised, such as using a gummi bear or PVA glue to bypass Apple’s TouchID, or using a picture to fool facial recognition on Android.

    To combat this, Apple disables the TouchID after five incorrect fingerprint attempts, requiring a passcode or password entry to re-enable the sensor. Likewise, current versions of Android enforce increasing time-outs on after a number of incorrect entries.

    These methods help strike a balance between security and usability, which is crucial for making sure smartphones don’t end up hurled at a wall.

    Although these lock screen protections are in place, your device may still contain bugs in its software that can allow attackers to bypass them. A quick search for “smartphone lock screen bypasses” on your favourite search engine will yield more results than you’d probably care to read.

    Lock screen bypasses are particularly problematic for older devices that are no longer receiving security updates, but new devices are not immune. For example, the latest major iOS release (iOS 9.0) contained a flaw that allowed users to access the device without entering a valid passcode via the Clock app, which is accessible on the lock screen. Similar bugs have been discovered for Android devices as well.

    All of these efforts could be thrown out the window if you install an app that includes malware.

    So, lock screens, Pin codes, passwords and swipe patters should only be considered your first line of defence rather than a foolproof means of securing your device.The Conversation

    • Clinton Carpene is post-doctoral researcher in network security, Edith Cowan University
    • This article was originally published on The Conversation


    Subscribe to TechCentral Subscribe to TechCentral
    Share. Facebook Twitter LinkedIn WhatsApp Telegram Email Copy Link
    Previous Article10 start-ups named for Barclays Accelerator
    Next Article Opera founder releases new Web browser

    Related Posts

    How a dowdy database maker became an investor darling

    18 June 2025

    Who let the dogs order? Sixty60 now delivers for Fido

    18 June 2025

    Sage brings together HR leaders to explore the future of payroll and people management

    18 June 2025
    Company News

    Sage brings together HR leaders to explore the future of payroll and people management

    18 June 2025

    Altron: a brand journey, a birthday celebration and a bet on Joburg’s future

    17 June 2025

    7 benefits of social media integration in WordPress

    17 June 2025
    Opinion

    Beyond the box: why IT distribution depends on real partnerships

    2 June 2025

    South Africa’s next crisis? Being offline in an AI-driven world

    2 June 2025

    Digital giants boost South African news media – and get blamed for it

    29 May 2025

    Subscribe to Updates

    Get the best South African technology news and analysis delivered to your e-mail inbox every morning.

    © 2009 - 2025 NewsCentral Media

    Type above and press Enter to search. Press Esc to cancel.